Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Tim GüneysuChair for Security Engineering, Ruhr-Universität BochumVerified email at rub.de
- Markus KrauszRuhr-University BochumVerified email at rub.de
- Gregor LeanderRuhr University BochumVerified email at rub.de
- Lucas Vincenzo DaviUniversity of Duisburg-EssenVerified email at uni-due.de
- Daniel J. BernsteinUniversity of Illinois at Chicago and Technische Universiteit EindhovenVerified email at box.cr.yp.to
- Dominic A. FunkeInstitute for Integrated Systems, Ruhr University BochumVerified email at rub.de
- Nils PohlRuhr-Universität Bochum, Fraunhofer FHRVerified email at rub.de
- Ming-Shing ChenAcademia SiniceVerified email at crypto.tw
- Yosuke TodoNTT Social Informatics LaboratoriesVerified email at ntt.com
- Rei UenoKyoto UniversityVerified email at kyoto-u.ac.jp
- Pascal SasdrichChair for Security Engineering, Ruhr-Universität Bochum, GermanyVerified email at rub.de
- Pascal CotretResearch scientistVerified email at ensta-bretagne.fr
- Vianney LapotreAssociate professor / Lab-STICCVerified email at univ-ubs.fr
- Guy GOGNIATProfessor, Université Bretagne SudVerified email at univ-ubs.fr
- Nicolas GaudinPhD student, Université de Bretagne Sud, Lab-STICC, FranceVerified email at univ-ubs.fr
- Moritz PetersRuhr-Universität BochumVerified email at rub.de
- Rebecca PelkeRWTH Aachen UniversityVerified email at ice.rwth-aachen.de
- Felix StaudiglRWTH Aachen UniversityVerified email at ice.rwth-aachen.de
- Georg LandRuhr-Universität BochumVerified email at ruhr-uni-bochum.de